keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
2017 Vol. 3, No. 5
Published: 16 May 2017

 
386 Microsoft China: The Implementation of Information Security and Cooperative Strategy
2017 Vol. 3 (5): 386-397 [Abstract] ( 153 ) HTML (1 KB)  PDF  (1668 KB)  ( 166 )
400 Privacy Preserving Cloud Computing—With a Focus on Multimedia Applications
2017 Vol. 3 (5): 400-411 [Abstract] ( 51 ) HTML (1 KB)  PDF  (11157 KB)  ( 42 )
412 Secure Operation Platform for Cloud Service
2017 Vol. 3 (5): 412-417 [Abstract] ( 129 ) HTML (1 KB)  PDF  (5505 KB)  ( 89 )
427 Promoting Information Security Is the Responsibility of the Enterprise
2017 Vol. 3 (5): 427-431 [Abstract] ( 75 ) HTML (1 KB)  PDF  (476 KB)  ( 82 )
432 Study of Security Protection System in Desktop Cloud
2017 Vol. 3 (5): 432-439 [Abstract] ( 58 ) HTML (1 KB)  PDF  (7176 KB)  ( 73 )
440 Trusted Computing: Constructing a New Architecture for Cloud Security
2017 Vol. 3 (5): 440-450 [Abstract] ( 78 ) HTML (1 KB)  PDF  (9099 KB)  ( 83 )
451 A Review on the Technology of Legal Software Protection
Sun Wei
2017 Vol. 3 (5): 451-461 [Abstract] ( 65 ) HTML (1 KB)  PDF  (8338 KB)  ( 59 )
462 A Formal Analysis Method with Forward Reasoning for Cryptographic Protocols
2017 Vol. 3 (5): 462-468 [Abstract] ( 47 ) HTML (1 KB)  PDF  (5238 KB)  ( 100 )
469 Analysis of Host Anomaly Behavior Based on Stream Data Feature Matchinge
Mei-Rong Mei-rongWEI
2017 Vol. 3 (5): 469-476 [Abstract] ( 52 ) HTML (1 KB)  PDF  (6181 KB)  ( 73 )
477 Talking About the Application of the Commercial Cryptography
2017 Vol. 3 (5): 477-480 [Abstract] ( 46 ) HTML (1 KB)  PDF  (723 KB)  ( 116 )
Copyright © Editorial Board of Journal of Information Security Research